Re: [dhcwg] Adoption call on draft-csl-dhc-dhcpv6-unknown-msg-3315update-00

Ted Lemon <Ted.Lemon@nominum.com> Wed, 03 April 2013 21:12 UTC

Return-Path: <Ted.Lemon@nominum.com>
X-Original-To: dhcwg@ietfa.amsl.com
Delivered-To: dhcwg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4180C21F8F56 for <dhcwg@ietfa.amsl.com>; Wed, 3 Apr 2013 14:12:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LsmscHkYF8CQ for <dhcwg@ietfa.amsl.com>; Wed, 3 Apr 2013 14:12:24 -0700 (PDT)
Received: from exprod7og102.obsmtp.com (exprod7og102.obsmtp.com [64.18.2.157]) by ietfa.amsl.com (Postfix) with ESMTP id 9201721F8F29 for <dhcwg@ietf.org>; Wed, 3 Apr 2013 14:12:24 -0700 (PDT)
Received: from shell-too.nominum.com ([64.89.228.229]) (using TLSv1) by exprod7ob102.postini.com ([64.18.6.12]) with SMTP ID DSNKUVybOI/TUPjdCu90+jdTnrEeYCWzeCNq@postini.com; Wed, 03 Apr 2013 14:12:24 PDT
Received: from archivist.nominum.com (archivist.nominum.com [64.89.228.108]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by shell-too.nominum.com (Postfix) with ESMTP id 12BC61B8B9D for <dhcwg@ietf.org>; Wed, 3 Apr 2013 14:12:24 -0700 (PDT)
Received: from webmail.nominum.com (cas-01.win.nominum.com [64.89.228.131]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (Client CN "mail.nominum.com", Issuer "Go Daddy Secure Certification Authority" (verified OK)) by archivist.nominum.com (Postfix) with ESMTPS id 08FCA19005C; Wed, 3 Apr 2013 14:12:24 -0700 (PDT) (envelope-from Ted.Lemon@nominum.com)
Received: from MBX-01.WIN.NOMINUM.COM ([64.89.228.133]) by CAS-01.WIN.NOMINUM.COM ([64.89.228.131]) with mapi id 14.02.0318.004; Wed, 3 Apr 2013 14:12:24 -0700
From: Ted Lemon <Ted.Lemon@nominum.com>
To: "Bernie Volz (volz)" <volz@cisco.com>
Thread-Topic: [dhcwg] Adoption call on draft-csl-dhc-dhcpv6-unknown-msg-3315update-00
Thread-Index: Ac4wkreb7nin94ZOTwuRlnHXXODFFAAV+PqA
Date: Wed, 03 Apr 2013 21:12:23 +0000
Message-ID: <8D23D4052ABE7A4490E77B1A012B630775130268@mbx-01.win.nominum.com>
References: <489D13FBFA9B3E41812EA89F188F018E184D2C7A@xmb-rcd-x04.cisco.com>
In-Reply-To: <489D13FBFA9B3E41812EA89F188F018E184D2C7A@xmb-rcd-x04.cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [192.168.1.10]
Content-Type: text/plain; charset="Windows-1252"
Content-ID: <ED48BCC56FE9AE4DBC54D09AABBC2CDC@nominum.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: dhcwg <dhcwg@ietf.org>
Subject: Re: [dhcwg] Adoption call on draft-csl-dhc-dhcpv6-unknown-msg-3315update-00
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <dhcwg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dhcwg>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Apr 2013 21:12:25 -0000

On Apr 3, 2013, at 2:04 PM, "Bernie Volz (volz)" <volz@cisco.com>
 wrote:
> The draft really should focus on the relay agent issue (what should a relay agent do with unknown message types). I would leave the client and server issues out of it as these are already pretty clear and I don't think there is any value in clarifying it. Sure, if some client or server has an if then else list or case statement where the last "else" or the "default" case was a particular message, they might mis-process that message but that is a client or server implementation issue and not an interoperability issue.

I don't really agree with this.   I do agree with your analysis of how servers and clients are likely implemented; every eval loop I've seen looks pretty much like what you described.   However, RFC3315 does not explicitly say that servers or clients should drop messages that they don't recognize, and while as you say, this probably does little harm, it's certainly an omission that ought to be corrected, and this seems like a convenient document to use to correct it.

> For that reason, I also think the document should be retitled to be something like "Relay Agent Handling of Unknown DHCPv6 Message Types"?

And hence I disagree with this proposed change. :)

> This document (I believe) intends to update RFC 3315, but does not indicate that in the header.

Good catch.

> This might be something to debate, but I would think it may want to make some explicit changes to RFC 3315. For example, RFC 3315 section 20.1 states:
> 
>   When a relay agent receives a
>   valid message to be relayed, it constructs a new Relay-forward
>   message.  
> 
> So what was meant by 'valid' message? Here, I suspect you want to clarify this and perhaps state everything but a Relay-Reply (at least at the present time, future documents might change this if there are messages intended for the Relay -- such as the new message proposed by draft-scskf-dhc-dhcpv4-over-dhcpv6). That in itself may create a slightly odd situation.

This is a really good point.

> I also wonder whether security considerations may allow a knob on the relay to specify whether it MAY 'restrict' the packets it forwards (mini 'firewall').

An additional paragraph in Security Considerations that says this might help:

Nothing in this update should be construed to mean that relay agents may not be administratively configurable to drop messages on the basis of the message type, for security reasons (e.g., in a firewall).   The sole purpose of requiring relay agents to relay unknown messages is to ensure that when legitimate new messages are defined in the protocol, relay agents, even if they were manufactured prior to the definition of these new messages, will, by default, succeed in relaying such messages.

> You may also want to discuss with Ted Lemon as to whether he should be an author as it may slightly complicate getting this document through the full IETF process.

Actually in this case I really am a co-author—Qi and Yong kindly agreed to help me to write the document, but as you may recall I was the one who originally proposed writing it.   It's a pretty simple document, so I think it's okay if Brian gets stuck being the responsible AD for it.